• Nenhum resultado encontrado

do contexto apresentado no cap´ıtulo 2 (sistemas distribu´ıdos em ambientes m´oveis) e com os resultados dos testes obtidos podemos assumir que a defini¸c˜ao do modelo proposto ´e realiz´avel e pr´atico. A seguran¸ca proporcionada pelo modelo herda alguns mecanismos de seguran¸ca da tecnologia Java o que facilitou a sua implementa¸c˜ao. Os testes realizados em rede celular 3G e rede ad hoc 802.11 apresentam resultados satisfat´orios que permitem julgar a pertinˆencia do modelo proposto.

7.2

Proposta de Continuidade

A arquitetura do framework desenvolvido apresenta uma facilidade de expans˜ao (es- calabilidade), a sua implementa¸c˜ao usa o paradigma de Orienta¸c˜ao a Objeto, portanto, novos servi¸cos de seguran¸ca podem ser desenvolvidos e acrescidos futuramente. Pode se pensar em algumas facilidades especificas para sistemas e-sa´ude como prevˆe a OMG no modelo CORBA. O servi¸co de privacidade implementado neste trabalho ´e limitado a uma gerˆencia de t´ıquetes distribu´ıdos pelo GRSec. Poderia se pensar em uma garantia de privacidade muito mais abrangente.

8

Referˆencias Bibliogr´aficas

ABBADI, E. A. et al. An Efficient Fault Tolerant Protocol for Replicated Data Management. In 4th ACM SIGACT-SIGMOD Symp. On Principle of Database Systems, Portland, OR, USA, pp. 215-28, ACM, 1985.

ABOBA, B.; SIMON, D. PPP EAP TLS Authentication Protocol. IETF RFC No. 2716, October 1999.

ABOWD, G. D., et al. Cyberguide: a Mobile Context-Aware Tour Guide. AM Wireless Networks, vol. 3, pp. 421- 433, 1997.

ALBUQUERQUE, A. L. P. Cen´arios virtuais com um estudo de sincronismo de cˆamera, 95 pp., Disserta¸c˜ao (Mestrado), Departamento de Inform´atica, PUC- RIO, 1999.

ALEXANDRE, V. M. Gerˆencia de Seguran¸ca em Aplica¸c˜oes de Banco de Dados na Web. Disserta¸c˜ao (Mestrado), CPGCC/UFSC. Mar¸co, 2000.

ARMSTRONG, R. et al. WebWatcher: A learning Apprendice for the World Wide Web. AAAI Spring Symposium on International Gathering, 2005.

ANDRE, M. B. da Gerˆencia Distribu´ıda de Redes Utilizando SNMP, Java, WWW e CORBA, Disserta¸c˜ao (Mestrado), CPGCC/UFSC Florian´opolis, abril 2000.

AUTOMATION World, article, 2004.

BAJURA, M.; NEUMANN, U. Dynamic registration correction in video-based aug- mented reality systems. IEEE Computer Graphics and Application, n. 9, September, 2005.

BALFANZ, D.; SMETTERS, D.; STEWART, P.; WONG, H. Talking to Strangers: Authentication in Ad-Hoc Wireless Network. In Symp on Network and Distributed Systems Security, San Dieogo, CA USA , 2002.

8 Referˆencias Bibliogr´aficas 122

BAN ˆATRE, M. et al. Ubiquitous computing to help blind People in public Transport. Mobile HCI 2004, p310-314,2004.

BAN ˆATRE, M. ; BRYCE, C. ; COUDERC, P. ; WEIS, F. Informatique diffuse: des concepts `a la r´ealit´e. Collection informatique, Brmes Sciences, paris 2007.

BELLOVIN, S.; MERRITT. Limitation of Kerberos Authentication System. in Processings of Winter 1991 Usenix Conference, January 1991. Disponivel em: <ftp://research.att.com/dist/internetsecurity/kerblimt.usenix.ps > .Acessoabril2009

BLUETOOTH. bluetooth.com, BLUETOOTH. Dispon´ıvel em : <www.bluetooth.com>. Acesso em julho 2006

BOLCER, G. A. et al. Peer to peer Architectures and the Magi Open Source. Infra – structure. Acesso novembro 2007

BONNEAU, V. Machine –to– Machine, forte croissnc Du wireless et impact Du RFID. M36105, IDATE, 2005.

BRANDS, S.; CHAUM, D. Distance Bounding Protocols. in EUROCRYPT 2003 LINCS765, PP 23-27, Springer, 2003.

BRENNAN, R.; JENNINGS, B.; MCARDLE, C, et al. Teletec Irland, Evolutionary Trends in Intelligent Networks. IEEE Communications Magazine, June 2000.

BUSSARD, L.; MOLVA, R. One Time Capabilities for Authorizations Without Trust. In 2nd IEEE int. conf. on Pervasive Computing and Communication, Per- Com04, Orlando FL, USA,pp 351-55,2005.

CAMPADELLO, S.; KOSKIMIES, O.; RAATIKAINEN, K.; HELIN H. Wireless Java RMI. Enterprise Distributed Object Computing Conference. EDOC 2000. Fourth International Sept. 2000.

CAMENISCH, J. HERREWEGHEN. Design and implementation of the IDEMIX Anonymous Credential System. In 9th ACM conf. On Computer and Communica- tion Security, CCS02, Washington, DC, USA, pp.21-30, ACM,2002

CDFUE. Charte des Droits Fondamentaux de LUnion Europeenne, articles 7 et 8. Journal officiel des communaut´es Europ´eennes 2000/C 364/01-22, d´ecembre 2000.

CELLER, B. G.; LOVELL, N. H.; BASILAKIS J. Using information technology to improve the management of chronic disease. Medical journal Australian, (s. 1), v. 179 no. 5 , pp. 242 – 246, September, 2003.

CHAU P. Y. K.; HU P. J. H. Technology Implementation for Telemedicine Programs. Communication of ACM, new York, v 47, n. 2, p. 87-92, February 2004.

CHAUM, D. Untraceable Electronic mail Return Addresses and Digital Pseudonyms. Communications of ACM, vol. 24, pp. 84-88 , 2001.

CHAUM, D. Blind Signatures for Untraceable Payments. in Crypto02, pp199-203, Plenum Press, 2002.

CHAUM, D. The Dining Cryptographers Problems : Unconditional Sender and Re- cipient Intractability. Journal of Cryptology, vol. 1, pp 65-75,1988.

CHENG – WEI, et al. Support and Optimization of Java RMI over Wireless Envi-

ronments. National Tsing Hua University, disponivel em: http://parallel.iis.sinica.edu.tw/cthpc2003/papers/CTHPC2003- 13.pdf. Aacesso em: setembro 2006.

CLULOW, J. et al. So Near and yet So Far: Distance Bounding Atacks in Wireless Networks. in European Workshop on Security na Privacity in Ad- Hoc and Sensor, ESAS 2006, lncs ,4357, pp 83-97, 2006.

CORBA; VERHOEVEN, R. Wireless CORBA. Dispon´ıvel em: em <http://kotisivu.mtv3.fi/ashar/software/miwco>. Acesso em: setembro 2006.

Conseil de l ´Europe, convention sur Le Cybercrime, 23 novembre 2001 , disponivel em <http://www.internet.gouv.fr/information/information/dossiers/cybercriminalite- politique-du-gouvernement/convention-sur-cybercriminalite-29.html>. Acesso em : 2009.

COULOURIS, G.; DOLLIMORE, J.; KINDBERG, T. Sistemas distribuidos: Con- ceitos e projeto, 4ed, Porto Alegre: Bookman, 2007.

COVINGTON, M. J. et al. A Context -A ware Security Architecture for Emerging Applications. In 18th Annual Computer Security Applications Conference, AC- SAC02, Las Vegas, NV, USA, pp249,2002.

DAVE, B.; LINDAMAY, P. WebSphere Everyplace Access: Extending enterprise applications to mobile users. IBM Corporation Somers, NY 10589 U.S.A, Julho 2002.

8 Referˆencias Bibliogr´aficas 124

DEMORACSKI, L. Fault-tolerant beacom Vetor Rounting for Mobile Ad Hoc Net- work. in 19th IEEE Int. Conf. On Parallel and Distributed Processing Symposium, IPDPS05, pp 279 , IEEE, 2005.

DIFFIE, W.; HELLMAN, M. E. New Directions in Cryptography. IEEE Transac- tions on Information Theory , vol IT-22, no. 6, pp 644 - 54. 2006.

EIKO, Y.; BACON J. Pronto: MobileGateway with Publish-Subscribe Paradigm over Wireless Network. University of Cambridge Computer Laboratory. Disponivel em : <http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-559.pdf>. Acesso em junho 2007

EYSENBACH G. What is e-health? J. Med. Internet Res. vol 3, no. 2 pp. 50-53, 2006.

FEENEY, L. M. A QoS Aware Power Save protocol for Wireless Ad Hoc Networks. in 1th Mediterranean Workshop on Ad Hoc Networks, Med-Hoc Net 2002, Sardenga, Italy, 2002.

FEINER, S.; MACINTIRE, B.; HOLLERER, T.; WESTER, A. A touring machine: prototyping 3D Mobile Augmented Reality Systems for Exploring the Urban Environ- ment. International Symposium on Wearable Computing, Cambridge, MA, Estados Unidos, IEEE, Otubro 1997.

FRANCE TELECOM. Eclairer l’avenir, no. 23, 2005.

GAST, M. S. 802.11 Wireless Networks: The Definition Guide. O’Reilly, 2002

GELERNTER, D. Generative Communication. In LINDA. ACM Transactions on Programming Language and Systems, 7(1), pp. 80-112, 2005

GIANUZZI, V. Data Replication Effectiveness in Mobile Ad Hoc Networks. In 1th ACM, int. Workshop on Performance Evaluation of Wireless Ad Hoc and Ubiquitous Networks, Venice, Italy, pp. 17-22, ACM, 2004. [] GOMEZ, L. et al. Using Sensor and Location Information for Context Aware Access Control. In int. Conf. On Computer as Tool EUROCON2005, Belgrade, Serbia Montenegro, 2005.

GONG, L.; SCHEMERS, R.; SIGNING. Sealing and Guarding Java Objects in Mo- bile Agents and Security. Springer-Verlag. Editor G. Vigna. LNCS 1419. Pp. 206-216. Berlim. 1998.

GUTTMAN, B.; BAGWILL, R. Internet Security Policy: A Technical Guide. NIST

special publication number 800-XX.Gaithersburg. July, 1997. Disponivel em: <http://csrc.nist.gov/isptg/html/>. Acesso em: junho 2008.

GRUBER, T. R. A translation approach to portable ontology specifications. Knowl- edge Acquisition – 5, pp. 199-200, 1993.

GRUNINGER, M.; FOX, M. S. Methodology for design and evaluation of ontology. Proceedings of workshop on basic ontological issues in knowledge sharing , Canada, 1995.

GRUNINGER, M.; LEE, J. Ontology application and design. Communication ACM, February, 2002.

HAGGERTY, P.; SEETHARAMAN, K. The Benefits of CORBA-Based Network Management. IEEE Communications of the ACM. vol. 41, pp. 73-79, 2000.

HAHN, J. H.; LEE, K. H.; RYOU, J. C. A Model of Security Platform Within TINA- based Management System. APNOMS, 16-18, Sendai, Japan, September 1998

HANCKE, P. G.; KUHN, G. An RFID Distance Bounding Protocol. in 1st int. Conf. On Security and Privacity for Emerging Areas on Communications Networks, Athens Greece, pp 67-73, IEEE, 2005.

HANDOREAN, R.; PAYTON, J.; JULIEN, C.; ROMAN, G. C. Coordination Mid- dleware Supporting Rapid Deployment of Ad Hoc Mobile Systems. Proceedings of The ICDCS Workshops, International Workshop on Mobile Computing Middleware (MCM 2003), pp. 363-368, May 2007.

HAPNER, M. et al. Java Message Service Especification. Sun Microsystems, Abril 2002.

HARA, T.; MADRIA, S. K. Data Replication for Improving Data Accessibility in Ad Hoc Networks. IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1515-32. 2006.

IC2. La Securit´e dans les R´eseaux sans Fil e M´obiles 1: Concepts Fondadamentaux .Technologies du Marche. ed. Lavoisier Hermes Science, 2007.

IC2. La Securit´e dans les R´eseaux sans Fil e M´obiles 2 : Concepts Fondadamentaux. Technologies du Marche,. ed. Lavoisier Hermes Science, 2007.

8 Referˆencias Bibliogr´aficas 126

ISMS2003. Identity Management Systems IMS: Identification and Comparison Study. Independent Center For Privacity Protection - ICPP, 2003.

ISO/IEC15408-2-2005. Technologies de linformation - Techniques de Securit´e- Crit`eres d´evaluation pour la Securit´e TI - Partie 2 : Exigence fonctionelles de S´ecurit´e. Norme International, ISO/IEC 15405-2-2005.

ITO, M. Um modelo de gest˜ao de paciente crˆonico baseado nos conceitos de rela- cionamento com cliente. 2006. 140 f. tese (Doutorado) - Escola Polit´ecnica, Uni- versidade de S˜ao Paulo, S˜ao Paulo, 2006.

ITU 2004 International Telecommunication Union Year 2001, General Overview of NGN, 2004.

JEAN, M. G.; CHRISTOPHE, G.; PHILLIPE, M. CORBA: des Concepts `a la Pratique . Collection Inter Editions. Edition Maison. Paris. France.1997.

JOHNSTON, R. G; WARNERJ. S. Think GPS Cargo Tracking = High Security? Think Again. Transport Security World, 2003.

JOSE, E. L. Arquitetura de Seguran¸ca para Rede Aplicada a Sistemas de Gerˆencia, Disserta¸c˜ao (Mestrado). CPGCC/UFSC BU/DPT 0-239-131-6. 2000.

JOSEPH, D. A.; TAUBER, A.J.; KAASHOEK, F. M, Mobile Computing with the Rover toolkit. IEEE Transaction Computing. 46 (3), pp. 337-352, 1997.

JUELS, A. RFID Security and Privacity: A research Survey. IEEE Journal on Slected Areas in Communication, vol. 24, no 2 pp318-94,2006.

KADDOUR M, P. L. Towards an Adaptable Message OrientedMiddleware for Mobile Environments. novembro 2006.

KADDOUR, M. PAULET, L. Une Approche Coop´erative de l’Adaptabilit´e des Appli-

cations Mobiles bas´ees sur MobileJMS. Disponivel em : http://www.infres.enst.fr/ pautet/papers/pautet04mobilejms.pdf. Acesso em: outubro 2006.

KARAM, D. J. Modelo de negocio para mobilidade e interatividade em ambientes convergentes heterogˆeneos. 2006, 80p tese (Doutorado) - Escola Polit´ecnica, Univer- sidade de S˜ao Paulo, S˜ao Paulo, 2006.

KENT; ATKINSON, 1998] KENT, S.; ATKINSON, R. IP Authentication Header (AH). IETF RFC No. 2402, November 1998.

KOERTUEM, et al, When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to- Peer Computing in Mobile Ad Hoc Networks, Proceeding 2001 International Con- ference on Peer-to-Peer Computing, Sue¸ca, 2001

LABROD H. and HFIFI H., de Bluetooth a WiFi, Hermes Sciences, 2008

LANSFORD, J. HomeRF: Bringing wireless connectivity. Disponivel em: Home.grouper.ieee.org/groups/8002/11/tutorial/90548S- WPAN-HomeRF- Tutorial.pdf>. Acesso em: novembro 2008..

MAFFEIS, S. Wireless IRELESS JMS Introduction `a Wireless JMS. Dispon´ıvel em: <http://www.softwired-inc.com/company/wjms.html>. Acesso: outubro 2006.

MAMPAEY, M.; COUTIRIER, A. A. Using TINA Concepts for Evolution. IEEE Communications Magazine, June 2000.

MANN, S. Smart Clothing: The Shift to Wearable Computing. Communication of ACM, vol. 39, no. 8, pp. 23-24, 1996.

MARTI, S. et al. Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks. in 6th conf. On Mobile Computing and Networking, Boston, MA, USA, pp 110-24,2005.

MARTIN, L. ; DEMERE, I. Bibliographical Survey of Data Sharing System for Mobile Ad-hoc Networks. ENST-France T´el´ecom, 2006

MASCOLO et al. Middleware for Mobile Computing. in Advanced Lectures on Networking: Networking 2002 tutorials, Pisa, Italy. Volume 2497 of LNCS, pp.20- 55, Springer Verlag, may 2002

MEDJI, K. Conception et r´ealisation d’une plateforme de r´epartition d´edi´ee aux en- vironnements nomades. 2006. 176 f. Th`ese ( Doctorat). ´Ecole Nationale Sup´erieure des Telecommunications de Paris, France. Acesso em : novembro 2006.

MICHIARDI, P. MOLVA, R. CORE: A collaboration Reputation Mechanism To Enforce Node Cooperation in Mobile Networks. in 6th IFIP, Portorosz , Slovenia, pp 107-21,2002.

MOM: middleware oriented message. Dispon´ıvel em: <http://pyfourmond.free.fr/mom.htm>. Acesso em: novembro 2006.

MURFPHY, A. L.; PICO, G. P.; ROMAN, G. C. Lime: A Middleware for Phys- ical and logical Mobility. In Proceedings of the 21st International Conference on Distribuited Computing System ICDCS-21, Maio 2007.

8 Referˆencias Bibliogr´aficas 128

NABET, D.; RIZCALLAH, D. K. Livre blanc Machine to Machine. Fing/Syntec/Orange, mar¸co 2006.

NAGAO, K.; REKIMOTO, J. Agent Augmented Reality: A Software Agent Meets the Real World. second International Conference on Multiagent Systems, 1996.

NETSCAPE white paper. The SSL Protocol, Cipher Used with SSL and the SSL

Handshake. Disponivel em: <http://developer.netscape.com/doc/manuals/security/sslin/contents.htm>. Acesso em: 2007

NGUESSAN, D. A Model of security Menagement for Distribued Objects. Master Thesis, UFSC-CPGCC, Florian´opolis, April 2000.

NGUESSAN, D. Estudo comparativo de modelos de seguran¸ca para computa¸c˜ao grid: globus e grid 5000. PCS5732 Poli USP, S˜ao Paulo setembro 2006.

NGUESSAN, D.; MARTINI, J. S. C. Study and Implementation of a Solution to Security Management for Mobile Environments Based on Tuple. icycs, 2008 The 9th International Conference for Young Computer Scientists, pp.2014-2020, 2008.

OFTA - Observatoire Fran¸cais des Techniques Avanc´ee. Informatique Diffuse, Paris, mai 2007

OLSEN, C. M.; NARAYANASWAMI, C. Powernap: Na Efficient Power Manage- ment Scheme for mobile Devices. IEEE Transactions on Mobile Computing, vol. 5, no. 7, pp. 816-28, 2006.

OMG. Wireless and Terminal Mobility in CORBA. v1.1. dispon´ıvel em: <www.omg.org/cgi- bin/doc?formal/2004-04-02 >, acesso em 2008.

OMG, MINIMUM. Disponivel em: <www.omg.org/cgi-bin/doc?formal/02-03-01>, 2002. Acesso em: junho 2007.

OMG Document, number 98-12-09. Security Service Specification, in CORBAser- vices. Common Object Services Specification. 1998, dispon´ıvel em: http://www.omg.org/. acesso em: 2008.

OMG. Unreliable Multicast Inter-ORB protocol Request For Proposal Document orbs/99-11-14, n]ovember 1999.

ONU217A Organisation des Nations Unies, ONU , Declaration Universelle des Droits de lhomme, Resolution 217 A, Paris, d´ecembre 1998

ORANGE – Syntec – Fing, Livre blanc do M2M, 2006.

ORFALI, R.; HARKEY D; EDWARDS, J. The Essential Distributed Object-Survival Guide. John Wiley Sons, Inc, 1996.

ORFALI, R.; HARKEY, D.; EDWARDS, J. Client/Server Programming. John Wiley Sons, Inc, 1996.

PASCOE, M. J., Adding generic Contextual Capabilities to Wearable Computers. ISWC98, Proceeding of second IEEE International Symposium on Wearable Com- puters, Washington, DC, Estados Unidos, IEEE Computer Society, pp. 92-99, 1998.

PALIVAN, O.; DINU, A. Incursion dans WIRELESS CORBA. Fiche ISAR mai 2005. Acesso em : setembro 2006.

PAROUX, G.; DEMEURE, I BARUCH, D. A. Survey of Middleware for Mobile Ad-hoc Networks. Ecole Nationale superieure des Telecommunications , ENST – France T´el´ecom RD, 2007.

PATRICK et al. Network Security it’s Time to Take Seriously. IEEE Communica- tions Magazine, February 1997.

PRONTO. What PRONTO offers?. Acesso em: outubro 2007.

RENE, M.; VINNY, C. Location-Aware Event-Based Middleware: A Paradigm for Collaborative Mobile Applications. Trinity College Dublin, Ireland, 2003.

RIEBACK et al, Is your Cat infected with a Computer Virus? in 4th Annual IEEE Int. Conf. on Pervasive Computing and Communication, PerCom 2006, Pisa, Italy . pp. 169-179, 2006.

RAY, I. Securing Pervasive Computing Applications. TrustCom08, china, 2008.

RODDEN, T.; CHEVERSTK.d. K.; DIX A. Exploiting Context in HCI Design for Mobile System. In Proceeding of the Workshop on Human Computer Interaction with Mobile Devices, maio 1998.

SAMFAT, D. Achitecture de securit´e pour les reseaux mobiles. Th`ese de doctorat LENST, janvier 2008.

SASTRY, N, et al. Secure Verification of location claims. in ACM Workshop on Wireless Security, WiSe, pp, 1-10, 2003.

8 Referˆencias Bibliogr´aficas 130

SATYANARAYANAN, M. Pervasive Computing : Vision and Challenges. in IEEE Personal Communication, 2001.

SCHILIT et al The ParcTab Mobile Computing System. Proceedings of the Fourth Workshop on Workstation Operating Systems. p. 34-39, otubro 1993.

SCHILL et al System Support for Mobile Distributed Applications. 2nd. Interna- tional Workshop on Service in Distributed and Network Environments, Whistle, British Columbia, June 1995.

SEKKAKI, A.; NGUESSAN, D.; M ¨ULLER M. D,; WESSTPHALL, C. B. Security within TINA accounting architecture management. ICC 2001 – IEEE international Conference on Communications no. 1, pp 199-203June 2001.

SOFTWIRED. Dispon´ıvel em: <Ibus//mobile. http://www.softwired-inc.com/products/mobile/mobile.html>. Acesso em: junho 2007.

TARI et al. Towards Cooperative Databases: The DOK Approach. Proceeding of the International Conference on Parallel and Distributed Computing Systems. Dijon. France. pp. 595-600, 1996.

TROELSEN, B.; SECCHI, R. Market Analysis Machine – to – Machine. Commu- nication. in western Europe, IDC, April, 2006.

WALLACH et al. Extensible Security Architectures for Java. Proceeding of the 16th Symposium on Operating Systems Principles. Saint-Malo, pp. 116-128,1997.

WALDO, J. JavaSpace Specifications 1,0: Technical Report. Sun Microsystems. Ma¸co 1998.

WANT, R. System Challenges for Ubiquitous and Pervasive Computing. in Pro- ceeding of the 27th International Conference on Software Engineering, ICSE 2005

WATERS, B.; FELTEN, E. Secure private Proofs of location. Princeton University, Technical Report TR - 667-03, January 2003

WEBSPHERE Everyplace. Acesso em: 2007.

WEISER, M. The Computer for the Twenty-First Century. In Scientific American, September 1991.

WEISER, M. Some Computer Science Issues in Ubiquitous Computing. In Com- munications of ACM, july 1993.

WESTPHALL, C. M. Esquemas de Autoriza¸c˜ao para a Programa¸c˜ao Distribu´ıda Combinando os Modelos de Seguran¸ca /CORBA/Web. Monografia ( exame de Qualifica¸c˜ao), UFSC-LCM Florian´opolis, julho de 1998. Certificado de Registro n. 165.663, Livro 277, Folha 4 da Funda¸c˜ao Biblioteca Nacional, Minist´erio da Cultura, Escrit´orio de Direitos Autorais, Rio de Janeiro, 1998.

WILIAM. S. Cryptography and Networks Security Principals and Practices. IEEE Communication magazine, july 2000.

WILLIAM S. Ciptografia e Seguran¸ca de Rade, Princ´ıpios e Pr´aticas. 4a. Ed. S˜ao Paulo, Pearson Prentice Hall, 2008.

WILSON D. P.; PAULO F. Engenharia de Software: Fundamentos M´etodos e Padr˜oes. 3. Ed. Rio de janeiro, LTC, 2009.

WIRELESS. Java RMI. XU Wei et LI Zhengmao – Fiche ISAR, mai 2005, dispon´ıvel em : <www.infres.enst.fr/ demeure/ISAR/FICHE1/WirelessCORBA>. acesso em: julho 2006

WYCKOFFet al T Space. Ibm systems Journal, 37(3):454-474, 1998.

YAO, D. et al. On improving the performance of Role Based Cascaded Delega- tion. in 1st int. Conf. On Security and Privacy for Emerging Areas on IEEE Communications Networks, Athens Greece, pp 157-70, 2005.

YONEKI, E.; BACON. J. PRONTO: Rapport technique sur Pronto. disponivel em: < http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-559.pdf> . Acesso em : outubro 2006.